\u201cIt doesn\u2019t mean that you don\u2019t need your physical passport to travel. We will get to the stage where we can have agreements. What is happening right now is we are linking every passport with the national ID card. The Ghana Card number and the passport number will be linked so that your travel history is preserved.\u201d<\/em><\/p>\n\n\n\n The awaited ID card with an e-passport function continues to evoke diverse opinions. Some experts question the preparade of airports and border checkpoints. Nonetheless, the Ghana Card will certainly make identification and validation quicker and more effective. Once the government completes the e-passport project, Ghana will join a few other nations in the world that issue national IDs with passport capabilities.<\/p>\n","post_title":"Here Is What You Can Or Cannot Do With Ghana Card","post_excerpt":"Ghana\u2019s national identity card, the Ghana Card, is set to be used globally as a valid ID card\/e-passport.","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"here-is-what-you-can-or-cannot-do-with-ghana-card","to_ping":"","pinged":"","post_modified":"2024-10-16 17:07:57","post_modified_gmt":"2024-10-16 17:07:57","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.africanvibes.com\/?p=332006","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":218566,"post_author":"2777","post_date":"2020-01-31 01:17:56","post_date_gmt":"2020-01-31 01:17:56","post_content":"\n\n[caption id=\"attachment_218567\" align=\"aligncenter\" width=\"735\"] Why Africans Need To Worry About The Wuhan Coronavirus<\/em>[\/caption]\n\nSince the outbreak of the Wuhan Coronavirus, the death toll has continued to grow. According to Worldometers<\/a>, at the time of writing this report, there are over 9,800 confirmed cases and 213 deaths. However, all the recorded deaths are in China. So far, the virus has spread to 23 countries and territories Including Oceania, United States, France, Germany, United Arab Emirates, Canada, Italy, and Finland. The majority of the infection cases are in Asian countries.\n\nAt the inception of the outbreak, the general belief was that Wuhan coronavirus can only move from animal-to-human. However, recent data suggest that the virus can move from human-to-human. The first human-to-human transmission outside China<\/a> was confirmed in the United States by the Center for Disease Control and Prevention. The husband of a female patient who visited China tested positive to the virus.\nAll You Need to Know About the Wuhan Coronavirus<\/h2>\nCoronaviruses (CoV) are a large group of viruses causing several illnesses including common cold. It can also cause more severe illnesses like Severe Acute Respiratory Syndrome<\/a> (SARS-CoV) and Middle East Respiratory Syndrome<\/a> (MERS-CoV). The Wuhan coronavirus (nCoV 2019) is a novel strain that has not been previously identified in humans.\n\nGenerally, coronaviruses are zoonotic. This means human beings get them from animals. Investigations into previous coronavirus outbreaks link them to animals. For example, MERS-CoV was from camels to humans while SARS-CoV was from civet cats to humans. There are several known coronaviruses that are circulating in animals but yet to infect humans.\n
How Government Intervention can halt the Spread into Africa<\/h2>\nSince managing the spread of the Wuhan coronavirus in Africa might be a serious challenge, more efforts should be put into preventing it. Some of the ways African government can curtail the spread of the virus include;\n
\n \t
Latest News on the Wuhan Coronavirus<\/h2>\nThe World Health Organization (WHO) on Thursday 30th January 2020 declared the Wuhan Coronavirus a global emergency. As the virus continues to spread, there are concerns that it may get to poorer nations with weaker health systems that may not have the capacity to properly manage it. Speaking during the declaration, the WHO chief, Tedros Adhanom Ghebreyesus said,\n\n\"The main reason for this declaration is not what is happening in China but what is happening in other countries. Let me be clear, this declaration is not a vote of no confidence in China.\"<\/em>\n
\n \t
Highlight of Shocking Data Breaches of the Last Decade<\/h2>\nTo further emphasize the importance of data privacy day celebration, it is important to highlight important data breaches in the last decade. According to a report by Business Insider<\/a>, 10 of the 15 largest data breach in history happened in the last decade. Consequently, some of these breaches helped shape the implementation of stricter consumer data protection policies.\n\n\n
Uber<\/h3>\n\n\nUber breach happened sometime in 2016. However, it was only disclosed in 2017. The breach exposed the personal information of over 57 million drivers and customers. The attackers stole personal information including phone numbers and email addresses. Also, the attackers were demanded $100,000 ransom. In the end, Uber was fined $150 million for concealing the breach.\n
Facebook<\/h3>\n\n\nA British political consulting firm, Cambridge Analytica, in 2018, harvested the personal data from the profile of millions of Facebook users for political advertising purposes. Consequently, Facebook was fined $663,000 which was the maximum fine at that time.\n
Awareness on Popular Techniques Attackers Use to Harvest Personal Data<\/h2>\nAs technology grows, hackers are also advancing their approach. Phishing was the most prominent hacking technique in the past. However, today there are more techniques. In line with the awareness goal of Data Privacy Day, here are the popular techniques hackers use to steal personal information from individuals and companies.\n
Phishing<\/h3>\nThis is an email sent with the intention of obtaining sensitive personal information including driver\u2019s license, bank account information, and so on. There are two ways they can do this. In the first method, the attacker can send a seemingly friendly message to lure you in. However, with subsequent replies, they send you phishing emails. In the second technique, they will send you an email with a link where you will have to insert your personal information.\n\n\n\nWhat you should do<\/strong>\n\nThe first thing you should do when you receive a suspicious email is to check the address of the sender. Never click on links in emails you don\u2019t recognize the sender. Other pointers to a phishing email include:\n
\n \t
Vishing<\/h3>\nHave you ever received a call from an unfamiliar person who is requesting your personal information? Well, that could be vishing. With the growth in social media and people easily giving out personal information on social platforms, hackers don\u2019t need to do hard work to know a bit of you\u2014and gain your trust in the process.\n
\n \t
Smishing<\/h3>\nThis is the mobile phone version of phishing. The attackers will send you a text message with an offer or with a URL to visit. At other times, there will be a phone number that you are to call.\n\nWhat you should do<\/strong>\n
\n \t
How to Improve the Security of Your Data<\/h2>\nMost African nations have a large population of digitally illiterate citizens. This is particularly making it easier for attackers. Out of ignorance, many Africans expose their personal information. Also, many organizations in Africa lack a strong digital security apparatus which makes them an easy target. Some of the ways individuals and businesses can increase their digital security include;\n
\n \t
<\/p>\n\n\n\n
\u201cIt doesn\u2019t mean that you don\u2019t need your physical passport to travel. We will get to the stage where we can have agreements. What is happening right now is we are linking every passport with the national ID card. The Ghana Card number and the passport number will be linked so that your travel history is preserved.\u201d<\/em><\/p>\n\n\n\n The awaited ID card with an e-passport function continues to evoke diverse opinions. Some experts question the preparade of airports and border checkpoints. Nonetheless, the Ghana Card will certainly make identification and validation quicker and more effective. Once the government completes the e-passport project, Ghana will join a few other nations in the world that issue national IDs with passport capabilities.<\/p>\n","post_title":"Here Is What You Can Or Cannot Do With Ghana Card","post_excerpt":"Ghana\u2019s national identity card, the Ghana Card, is set to be used globally as a valid ID card\/e-passport.","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"here-is-what-you-can-or-cannot-do-with-ghana-card","to_ping":"","pinged":"","post_modified":"2024-10-16 17:07:57","post_modified_gmt":"2024-10-16 17:07:57","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.africanvibes.com\/?p=332006","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":218566,"post_author":"2777","post_date":"2020-01-31 01:17:56","post_date_gmt":"2020-01-31 01:17:56","post_content":"\n\n[caption id=\"attachment_218567\" align=\"aligncenter\" width=\"735\"] Why Africans Need To Worry About The Wuhan Coronavirus<\/em>[\/caption]\n\nSince the outbreak of the Wuhan Coronavirus, the death toll has continued to grow. According to Worldometers<\/a>, at the time of writing this report, there are over 9,800 confirmed cases and 213 deaths. However, all the recorded deaths are in China. So far, the virus has spread to 23 countries and territories Including Oceania, United States, France, Germany, United Arab Emirates, Canada, Italy, and Finland. The majority of the infection cases are in Asian countries.\n\nAt the inception of the outbreak, the general belief was that Wuhan coronavirus can only move from animal-to-human. However, recent data suggest that the virus can move from human-to-human. The first human-to-human transmission outside China<\/a> was confirmed in the United States by the Center for Disease Control and Prevention. The husband of a female patient who visited China tested positive to the virus.\nAll You Need to Know About the Wuhan Coronavirus<\/h2>\nCoronaviruses (CoV) are a large group of viruses causing several illnesses including common cold. It can also cause more severe illnesses like Severe Acute Respiratory Syndrome<\/a> (SARS-CoV) and Middle East Respiratory Syndrome<\/a> (MERS-CoV). The Wuhan coronavirus (nCoV 2019) is a novel strain that has not been previously identified in humans.\n\nGenerally, coronaviruses are zoonotic. This means human beings get them from animals. Investigations into previous coronavirus outbreaks link them to animals. For example, MERS-CoV was from camels to humans while SARS-CoV was from civet cats to humans. There are several known coronaviruses that are circulating in animals but yet to infect humans.\n
How Government Intervention can halt the Spread into Africa<\/h2>\nSince managing the spread of the Wuhan coronavirus in Africa might be a serious challenge, more efforts should be put into preventing it. Some of the ways African government can curtail the spread of the virus include;\n
\n \t
Latest News on the Wuhan Coronavirus<\/h2>\nThe World Health Organization (WHO) on Thursday 30th January 2020 declared the Wuhan Coronavirus a global emergency. As the virus continues to spread, there are concerns that it may get to poorer nations with weaker health systems that may not have the capacity to properly manage it. Speaking during the declaration, the WHO chief, Tedros Adhanom Ghebreyesus said,\n\n\"The main reason for this declaration is not what is happening in China but what is happening in other countries. Let me be clear, this declaration is not a vote of no confidence in China.\"<\/em>\n
\n \t
Highlight of Shocking Data Breaches of the Last Decade<\/h2>\nTo further emphasize the importance of data privacy day celebration, it is important to highlight important data breaches in the last decade. According to a report by Business Insider<\/a>, 10 of the 15 largest data breach in history happened in the last decade. Consequently, some of these breaches helped shape the implementation of stricter consumer data protection policies.\n\n\n
Uber<\/h3>\n\n\nUber breach happened sometime in 2016. However, it was only disclosed in 2017. The breach exposed the personal information of over 57 million drivers and customers. The attackers stole personal information including phone numbers and email addresses. Also, the attackers were demanded $100,000 ransom. In the end, Uber was fined $150 million for concealing the breach.\n
Facebook<\/h3>\n\n\nA British political consulting firm, Cambridge Analytica, in 2018, harvested the personal data from the profile of millions of Facebook users for political advertising purposes. Consequently, Facebook was fined $663,000 which was the maximum fine at that time.\n
Awareness on Popular Techniques Attackers Use to Harvest Personal Data<\/h2>\nAs technology grows, hackers are also advancing their approach. Phishing was the most prominent hacking technique in the past. However, today there are more techniques. In line with the awareness goal of Data Privacy Day, here are the popular techniques hackers use to steal personal information from individuals and companies.\n
Phishing<\/h3>\nThis is an email sent with the intention of obtaining sensitive personal information including driver\u2019s license, bank account information, and so on. There are two ways they can do this. In the first method, the attacker can send a seemingly friendly message to lure you in. However, with subsequent replies, they send you phishing emails. In the second technique, they will send you an email with a link where you will have to insert your personal information.\n\n\n\nWhat you should do<\/strong>\n\nThe first thing you should do when you receive a suspicious email is to check the address of the sender. Never click on links in emails you don\u2019t recognize the sender. Other pointers to a phishing email include:\n
\n \t
Vishing<\/h3>\nHave you ever received a call from an unfamiliar person who is requesting your personal information? Well, that could be vishing. With the growth in social media and people easily giving out personal information on social platforms, hackers don\u2019t need to do hard work to know a bit of you\u2014and gain your trust in the process.\n
\n \t
Smishing<\/h3>\nThis is the mobile phone version of phishing. The attackers will send you a text message with an offer or with a URL to visit. At other times, there will be a phone number that you are to call.\n\nWhat you should do<\/strong>\n
\n \t
How to Improve the Security of Your Data<\/h2>\nMost African nations have a large population of digitally illiterate citizens. This is particularly making it easier for attackers. Out of ignorance, many Africans expose their personal information. Also, many organizations in Africa lack a strong digital security apparatus which makes them an easy target. Some of the ways individuals and businesses can increase their digital security include;\n
\n \t
But some Ghanaians dismissed this statement with some saying it was merely the VP\u2019s imagination that wasn\u2019t possible. Others termed it as falsehood. The VP has since come out to clarify this contentious issue saying,<\/p>\n\n\n\n
<\/p>\n\n\n\n
\u201cIt doesn\u2019t mean that you don\u2019t need your physical passport to travel. We will get to the stage where we can have agreements. What is happening right now is we are linking every passport with the national ID card. The Ghana Card number and the passport number will be linked so that your travel history is preserved.\u201d<\/em><\/p>\n\n\n\n The awaited ID card with an e-passport function continues to evoke diverse opinions. Some experts question the preparade of airports and border checkpoints. Nonetheless, the Ghana Card will certainly make identification and validation quicker and more effective. Once the government completes the e-passport project, Ghana will join a few other nations in the world that issue national IDs with passport capabilities.<\/p>\n","post_title":"Here Is What You Can Or Cannot Do With Ghana Card","post_excerpt":"Ghana\u2019s national identity card, the Ghana Card, is set to be used globally as a valid ID card\/e-passport.","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"here-is-what-you-can-or-cannot-do-with-ghana-card","to_ping":"","pinged":"","post_modified":"2024-10-16 17:07:57","post_modified_gmt":"2024-10-16 17:07:57","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.africanvibes.com\/?p=332006","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":218566,"post_author":"2777","post_date":"2020-01-31 01:17:56","post_date_gmt":"2020-01-31 01:17:56","post_content":"\n\n[caption id=\"attachment_218567\" align=\"aligncenter\" width=\"735\"] Why Africans Need To Worry About The Wuhan Coronavirus<\/em>[\/caption]\n\nSince the outbreak of the Wuhan Coronavirus, the death toll has continued to grow. According to Worldometers<\/a>, at the time of writing this report, there are over 9,800 confirmed cases and 213 deaths. However, all the recorded deaths are in China. So far, the virus has spread to 23 countries and territories Including Oceania, United States, France, Germany, United Arab Emirates, Canada, Italy, and Finland. The majority of the infection cases are in Asian countries.\n\nAt the inception of the outbreak, the general belief was that Wuhan coronavirus can only move from animal-to-human. However, recent data suggest that the virus can move from human-to-human. The first human-to-human transmission outside China<\/a> was confirmed in the United States by the Center for Disease Control and Prevention. The husband of a female patient who visited China tested positive to the virus.\nAll You Need to Know About the Wuhan Coronavirus<\/h2>\nCoronaviruses (CoV) are a large group of viruses causing several illnesses including common cold. It can also cause more severe illnesses like Severe Acute Respiratory Syndrome<\/a> (SARS-CoV) and Middle East Respiratory Syndrome<\/a> (MERS-CoV). The Wuhan coronavirus (nCoV 2019) is a novel strain that has not been previously identified in humans.\n\nGenerally, coronaviruses are zoonotic. This means human beings get them from animals. Investigations into previous coronavirus outbreaks link them to animals. For example, MERS-CoV was from camels to humans while SARS-CoV was from civet cats to humans. There are several known coronaviruses that are circulating in animals but yet to infect humans.\n
How Government Intervention can halt the Spread into Africa<\/h2>\nSince managing the spread of the Wuhan coronavirus in Africa might be a serious challenge, more efforts should be put into preventing it. Some of the ways African government can curtail the spread of the virus include;\n
\n \t
Latest News on the Wuhan Coronavirus<\/h2>\nThe World Health Organization (WHO) on Thursday 30th January 2020 declared the Wuhan Coronavirus a global emergency. As the virus continues to spread, there are concerns that it may get to poorer nations with weaker health systems that may not have the capacity to properly manage it. Speaking during the declaration, the WHO chief, Tedros Adhanom Ghebreyesus said,\n\n\"The main reason for this declaration is not what is happening in China but what is happening in other countries. Let me be clear, this declaration is not a vote of no confidence in China.\"<\/em>\n
\n \t
Highlight of Shocking Data Breaches of the Last Decade<\/h2>\nTo further emphasize the importance of data privacy day celebration, it is important to highlight important data breaches in the last decade. According to a report by Business Insider<\/a>, 10 of the 15 largest data breach in history happened in the last decade. Consequently, some of these breaches helped shape the implementation of stricter consumer data protection policies.\n\n\n
Uber<\/h3>\n\n\nUber breach happened sometime in 2016. However, it was only disclosed in 2017. The breach exposed the personal information of over 57 million drivers and customers. The attackers stole personal information including phone numbers and email addresses. Also, the attackers were demanded $100,000 ransom. In the end, Uber was fined $150 million for concealing the breach.\n
Facebook<\/h3>\n\n\nA British political consulting firm, Cambridge Analytica, in 2018, harvested the personal data from the profile of millions of Facebook users for political advertising purposes. Consequently, Facebook was fined $663,000 which was the maximum fine at that time.\n
Awareness on Popular Techniques Attackers Use to Harvest Personal Data<\/h2>\nAs technology grows, hackers are also advancing their approach. Phishing was the most prominent hacking technique in the past. However, today there are more techniques. In line with the awareness goal of Data Privacy Day, here are the popular techniques hackers use to steal personal information from individuals and companies.\n
Phishing<\/h3>\nThis is an email sent with the intention of obtaining sensitive personal information including driver\u2019s license, bank account information, and so on. There are two ways they can do this. In the first method, the attacker can send a seemingly friendly message to lure you in. However, with subsequent replies, they send you phishing emails. In the second technique, they will send you an email with a link where you will have to insert your personal information.\n\n\n\nWhat you should do<\/strong>\n\nThe first thing you should do when you receive a suspicious email is to check the address of the sender. Never click on links in emails you don\u2019t recognize the sender. Other pointers to a phishing email include:\n
\n \t
Vishing<\/h3>\nHave you ever received a call from an unfamiliar person who is requesting your personal information? Well, that could be vishing. With the growth in social media and people easily giving out personal information on social platforms, hackers don\u2019t need to do hard work to know a bit of you\u2014and gain your trust in the process.\n
\n \t
Smishing<\/h3>\nThis is the mobile phone version of phishing. The attackers will send you a text message with an offer or with a URL to visit. At other times, there will be a phone number that you are to call.\n\nWhat you should do<\/strong>\n
\n \t
How to Improve the Security of Your Data<\/h2>\nMost African nations have a large population of digitally illiterate citizens. This is particularly making it easier for attackers. Out of ignorance, many Africans expose their personal information. Also, many organizations in Africa lack a strong digital security apparatus which makes them an easy target. Some of the ways individuals and businesses can increase their digital security include;\n
\n \t
Skepticism on the Ghana card e-passport status<\/h3>\n\n\n\n
But some Ghanaians dismissed this statement with some saying it was merely the VP\u2019s imagination that wasn\u2019t possible. Others termed it as falsehood. The VP has since come out to clarify this contentious issue saying,<\/p>\n\n\n\n
<\/p>\n\n\n\n
\u201cIt doesn\u2019t mean that you don\u2019t need your physical passport to travel. We will get to the stage where we can have agreements. What is happening right now is we are linking every passport with the national ID card. The Ghana Card number and the passport number will be linked so that your travel history is preserved.\u201d<\/em><\/p>\n\n\n\n The awaited ID card with an e-passport function continues to evoke diverse opinions. Some experts question the preparade of airports and border checkpoints. Nonetheless, the Ghana Card will certainly make identification and validation quicker and more effective. Once the government completes the e-passport project, Ghana will join a few other nations in the world that issue national IDs with passport capabilities.<\/p>\n","post_title":"Here Is What You Can Or Cannot Do With Ghana Card","post_excerpt":"Ghana\u2019s national identity card, the Ghana Card, is set to be used globally as a valid ID card\/e-passport.","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"here-is-what-you-can-or-cannot-do-with-ghana-card","to_ping":"","pinged":"","post_modified":"2024-10-16 17:07:57","post_modified_gmt":"2024-10-16 17:07:57","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.africanvibes.com\/?p=332006","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":218566,"post_author":"2777","post_date":"2020-01-31 01:17:56","post_date_gmt":"2020-01-31 01:17:56","post_content":"\n\n[caption id=\"attachment_218567\" align=\"aligncenter\" width=\"735\"] Why Africans Need To Worry About The Wuhan Coronavirus<\/em>[\/caption]\n\nSince the outbreak of the Wuhan Coronavirus, the death toll has continued to grow. According to Worldometers<\/a>, at the time of writing this report, there are over 9,800 confirmed cases and 213 deaths. However, all the recorded deaths are in China. So far, the virus has spread to 23 countries and territories Including Oceania, United States, France, Germany, United Arab Emirates, Canada, Italy, and Finland. The majority of the infection cases are in Asian countries.\n\nAt the inception of the outbreak, the general belief was that Wuhan coronavirus can only move from animal-to-human. However, recent data suggest that the virus can move from human-to-human. The first human-to-human transmission outside China<\/a> was confirmed in the United States by the Center for Disease Control and Prevention. The husband of a female patient who visited China tested positive to the virus.\nAll You Need to Know About the Wuhan Coronavirus<\/h2>\nCoronaviruses (CoV) are a large group of viruses causing several illnesses including common cold. It can also cause more severe illnesses like Severe Acute Respiratory Syndrome<\/a> (SARS-CoV) and Middle East Respiratory Syndrome<\/a> (MERS-CoV). The Wuhan coronavirus (nCoV 2019) is a novel strain that has not been previously identified in humans.\n\nGenerally, coronaviruses are zoonotic. This means human beings get them from animals. Investigations into previous coronavirus outbreaks link them to animals. For example, MERS-CoV was from camels to humans while SARS-CoV was from civet cats to humans. There are several known coronaviruses that are circulating in animals but yet to infect humans.\n
How Government Intervention can halt the Spread into Africa<\/h2>\nSince managing the spread of the Wuhan coronavirus in Africa might be a serious challenge, more efforts should be put into preventing it. Some of the ways African government can curtail the spread of the virus include;\n
\n \t
Latest News on the Wuhan Coronavirus<\/h2>\nThe World Health Organization (WHO) on Thursday 30th January 2020 declared the Wuhan Coronavirus a global emergency. As the virus continues to spread, there are concerns that it may get to poorer nations with weaker health systems that may not have the capacity to properly manage it. Speaking during the declaration, the WHO chief, Tedros Adhanom Ghebreyesus said,\n\n\"The main reason for this declaration is not what is happening in China but what is happening in other countries. Let me be clear, this declaration is not a vote of no confidence in China.\"<\/em>\n
\n \t
Highlight of Shocking Data Breaches of the Last Decade<\/h2>\nTo further emphasize the importance of data privacy day celebration, it is important to highlight important data breaches in the last decade. According to a report by Business Insider<\/a>, 10 of the 15 largest data breach in history happened in the last decade. Consequently, some of these breaches helped shape the implementation of stricter consumer data protection policies.\n\n\n
Uber<\/h3>\n\n\nUber breach happened sometime in 2016. However, it was only disclosed in 2017. The breach exposed the personal information of over 57 million drivers and customers. The attackers stole personal information including phone numbers and email addresses. Also, the attackers were demanded $100,000 ransom. In the end, Uber was fined $150 million for concealing the breach.\n
Facebook<\/h3>\n\n\nA British political consulting firm, Cambridge Analytica, in 2018, harvested the personal data from the profile of millions of Facebook users for political advertising purposes. Consequently, Facebook was fined $663,000 which was the maximum fine at that time.\n
Awareness on Popular Techniques Attackers Use to Harvest Personal Data<\/h2>\nAs technology grows, hackers are also advancing their approach. Phishing was the most prominent hacking technique in the past. However, today there are more techniques. In line with the awareness goal of Data Privacy Day, here are the popular techniques hackers use to steal personal information from individuals and companies.\n
Phishing<\/h3>\nThis is an email sent with the intention of obtaining sensitive personal information including driver\u2019s license, bank account information, and so on. There are two ways they can do this. In the first method, the attacker can send a seemingly friendly message to lure you in. However, with subsequent replies, they send you phishing emails. In the second technique, they will send you an email with a link where you will have to insert your personal information.\n\n\n\nWhat you should do<\/strong>\n\nThe first thing you should do when you receive a suspicious email is to check the address of the sender. Never click on links in emails you don\u2019t recognize the sender. Other pointers to a phishing email include:\n
\n \t
Vishing<\/h3>\nHave you ever received a call from an unfamiliar person who is requesting your personal information? Well, that could be vishing. With the growth in social media and people easily giving out personal information on social platforms, hackers don\u2019t need to do hard work to know a bit of you\u2014and gain your trust in the process.\n
\n \t
Smishing<\/h3>\nThis is the mobile phone version of phishing. The attackers will send you a text message with an offer or with a URL to visit. At other times, there will be a phone number that you are to call.\n\nWhat you should do<\/strong>\n
\n \t
How to Improve the Security of Your Data<\/h2>\nMost African nations have a large population of digitally illiterate citizens. This is particularly making it easier for attackers. Out of ignorance, many Africans expose their personal information. Also, many organizations in Africa lack a strong digital security apparatus which makes them an easy target. Some of the ways individuals and businesses can increase their digital security include;\n
\n \t
\u201cIt is not widely known that the Ghana Card is also an electronic passport (e-passport) that contains the biometric information that can be used to authenticate the identity of travelers. We have been working with the International Civil Aviation Organization (ICAO) this year to globally activate the e-passport function of the Ghana card\u2026\u201d<\/em><\/p>\n\n\n\n But some Ghanaians dismissed this statement with some saying it was merely the VP\u2019s imagination that wasn\u2019t possible. Others termed it as falsehood. The VP has since come out to clarify this contentious issue saying,<\/p>\n\n\n\n <\/p>\n\n\n\n \u201cIt doesn\u2019t mean that you don\u2019t need your physical passport to travel. We will get to the stage where we can have agreements. What is happening right now is we are linking every passport with the national ID card. The Ghana Card number and the passport number will be linked so that your travel history is preserved.\u201d<\/em><\/p>\n\n\n\n The awaited ID card with an e-passport function continues to evoke diverse opinions. Some experts question the preparade of airports and border checkpoints. Nonetheless, the Ghana Card will certainly make identification and validation quicker and more effective. Once the government completes the e-passport project, Ghana will join a few other nations in the world that issue national IDs with passport capabilities.<\/p>\n","post_title":"Here Is What You Can Or Cannot Do With Ghana Card","post_excerpt":"Ghana\u2019s national identity card, the Ghana Card, is set to be used globally as a valid ID card\/e-passport.","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"here-is-what-you-can-or-cannot-do-with-ghana-card","to_ping":"","pinged":"","post_modified":"2024-10-16 17:07:57","post_modified_gmt":"2024-10-16 17:07:57","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.africanvibes.com\/?p=332006","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":218566,"post_author":"2777","post_date":"2020-01-31 01:17:56","post_date_gmt":"2020-01-31 01:17:56","post_content":"\n\n[caption id=\"attachment_218567\" align=\"aligncenter\" width=\"735\"] Why Africans Need To Worry About The Wuhan Coronavirus<\/em>[\/caption]\n\nSince the outbreak of the Wuhan Coronavirus, the death toll has continued to grow. According to Worldometers<\/a>, at the time of writing this report, there are over 9,800 confirmed cases and 213 deaths. However, all the recorded deaths are in China. So far, the virus has spread to 23 countries and territories Including Oceania, United States, France, Germany, United Arab Emirates, Canada, Italy, and Finland. The majority of the infection cases are in Asian countries.\n\nAt the inception of the outbreak, the general belief was that Wuhan coronavirus can only move from animal-to-human. However, recent data suggest that the virus can move from human-to-human. The first human-to-human transmission outside China<\/a> was confirmed in the United States by the Center for Disease Control and Prevention. The husband of a female patient who visited China tested positive to the virus.\nSkepticism on the Ghana card e-passport status<\/h3>\n\n\n\n
All You Need to Know About the Wuhan Coronavirus<\/h2>\nCoronaviruses (CoV) are a large group of viruses causing several illnesses including common cold. It can also cause more severe illnesses like Severe Acute Respiratory Syndrome<\/a> (SARS-CoV) and Middle East Respiratory Syndrome<\/a> (MERS-CoV). The Wuhan coronavirus (nCoV 2019) is a novel strain that has not been previously identified in humans.\n\nGenerally, coronaviruses are zoonotic. This means human beings get them from animals. Investigations into previous coronavirus outbreaks link them to animals. For example, MERS-CoV was from camels to humans while SARS-CoV was from civet cats to humans. There are several known coronaviruses that are circulating in animals but yet to infect humans.\n
How Government Intervention can halt the Spread into Africa<\/h2>\nSince managing the spread of the Wuhan coronavirus in Africa might be a serious challenge, more efforts should be put into preventing it. Some of the ways African government can curtail the spread of the virus include;\n
\n \t
Latest News on the Wuhan Coronavirus<\/h2>\nThe World Health Organization (WHO) on Thursday 30th January 2020 declared the Wuhan Coronavirus a global emergency. As the virus continues to spread, there are concerns that it may get to poorer nations with weaker health systems that may not have the capacity to properly manage it. Speaking during the declaration, the WHO chief, Tedros Adhanom Ghebreyesus said,\n\n\"The main reason for this declaration is not what is happening in China but what is happening in other countries. Let me be clear, this declaration is not a vote of no confidence in China.\"<\/em>\n
\n \t
Highlight of Shocking Data Breaches of the Last Decade<\/h2>\nTo further emphasize the importance of data privacy day celebration, it is important to highlight important data breaches in the last decade. According to a report by Business Insider<\/a>, 10 of the 15 largest data breach in history happened in the last decade. Consequently, some of these breaches helped shape the implementation of stricter consumer data protection policies.\n\n\n
Uber<\/h3>\n\n\nUber breach happened sometime in 2016. However, it was only disclosed in 2017. The breach exposed the personal information of over 57 million drivers and customers. The attackers stole personal information including phone numbers and email addresses. Also, the attackers were demanded $100,000 ransom. In the end, Uber was fined $150 million for concealing the breach.\n
Facebook<\/h3>\n\n\nA British political consulting firm, Cambridge Analytica, in 2018, harvested the personal data from the profile of millions of Facebook users for political advertising purposes. Consequently, Facebook was fined $663,000 which was the maximum fine at that time.\n
Awareness on Popular Techniques Attackers Use to Harvest Personal Data<\/h2>\nAs technology grows, hackers are also advancing their approach. Phishing was the most prominent hacking technique in the past. However, today there are more techniques. In line with the awareness goal of Data Privacy Day, here are the popular techniques hackers use to steal personal information from individuals and companies.\n
Phishing<\/h3>\nThis is an email sent with the intention of obtaining sensitive personal information including driver\u2019s license, bank account information, and so on. There are two ways they can do this. In the first method, the attacker can send a seemingly friendly message to lure you in. However, with subsequent replies, they send you phishing emails. In the second technique, they will send you an email with a link where you will have to insert your personal information.\n\n\n\nWhat you should do<\/strong>\n\nThe first thing you should do when you receive a suspicious email is to check the address of the sender. Never click on links in emails you don\u2019t recognize the sender. Other pointers to a phishing email include:\n
\n \t
Vishing<\/h3>\nHave you ever received a call from an unfamiliar person who is requesting your personal information? Well, that could be vishing. With the growth in social media and people easily giving out personal information on social platforms, hackers don\u2019t need to do hard work to know a bit of you\u2014and gain your trust in the process.\n
\n \t
Smishing<\/h3>\nThis is the mobile phone version of phishing. The attackers will send you a text message with an offer or with a URL to visit. At other times, there will be a phone number that you are to call.\n\nWhat you should do<\/strong>\n
\n \t
How to Improve the Security of Your Data<\/h2>\nMost African nations have a large population of digitally illiterate citizens. This is particularly making it easier for attackers. Out of ignorance, many Africans expose their personal information. Also, many organizations in Africa lack a strong digital security apparatus which makes them an easy target. Some of the ways individuals and businesses can increase their digital security include;\n
\n \t